First published: Fri Jan 23 2009(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in `action/AttachFile.py` in MoinMoin before 1.8.1 allow remote attackers to inject arbitrary web script or HTML via an AttachFile action to the WikiSandBox component with (1) the rename parameter or (2) the drawing parameter (aka the basename variable).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/moin | 1.9.9-1+deb10u1 | |
pip/moin | <1.8.1 | 1.8.1 |
Mastodon | =1.5.5a | |
Mastodon | =0.2 | |
Mastodon | =1.5.7 | |
Mastodon | =1.5.2 | |
Mastodon | =1.2 | |
Mastodon | =1.5.5_rc1 | |
Mastodon | =1.6.3 | |
Mastodon | =1.6.0 | |
Mastodon | =1.5.0 | |
Mastodon | =1.5.3_rc1 | |
Mastodon | =0.9 | |
Mastodon | =0.3 | |
Mastodon | =1.5.3_rc2 | |
Mastodon | =1.7.1 | |
Mastodon | =1.2.1 | |
Mastodon | =1.5.1 | |
Mastodon | =1.5.6 | |
Mastodon | =1.0 | |
Mastodon | =0.1 | |
Mastodon | =1.5.4 | |
Mastodon | =1.2.2 | |
Mastodon | =0.8 | |
Mastodon | =1.6.2 | |
Mastodon | <=1.8.0 | |
Mastodon | =1.7.0 | |
Mastodon | =1.5.5 | |
Mastodon | =0.10 | |
Mastodon | =1.5.3 | |
Mastodon | =1.1 | |
Mastodon | =0.7 | |
Mastodon | =1.6.1 | |
Mastodon | =1.6 | |
Mastodon | =1.5.8 | |
Mastodon | =1.7.3 | |
Mastodon | =1.7.2 | |
Mastodon | =0.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0260 has been classified as a medium severity vulnerability due to its cross-site scripting (XSS) potential.
To fix CVE-2009-0260, upgrade to MoinMoin version 1.8.1 or later.
CVE-2009-0260 affects MoinMoin versions prior to 1.8.1, including all versions from 0.1 to 1.8.0.
Yes, CVE-2009-0260 can be exploited remotely, allowing attackers to inject arbitrary scripts through affected actions.
CVE-2009-0260 affects the 'AttachFile' action within the WikiSandBox component of MoinMoin.